Give Your AI a Soul, Not Just a Session ID
Traditional AI systems store agent state in databases using simple session IDs. When the server crashes, the database connection fails, or the agent needs to move between clouds—the context is lost. Your agent wakes up with amnesia.
LockStock Core treats agent identity as an intrinsic property of the data structure itself, not a label in a database column. This enables true portability, mathematical lineage verification, and zero-loss state continuity.
Identity is not a label; it is the sum of a complete history.
Every agent is issued a cryptographic "passport"—a dynamic object signed with HMAC-SHA256. Every action is verified against the agent's public key. Without the private signing key held in the secure enclave, a "clone" is instantly rejected as a forgery.
The Passport Mechanism: Every agent carries proof of its entire execution history. To verify identity, simply check the cryptographic chain from genesis to current state.
Agent state evolves through cryptographically-linked transitions that create an unforgeable mathematical proof of every action.
We moved beyond simple version numbers (v1, v2, v3) to cryptographic state evolution. Every state change is a sequenced transition that's mathematically linked to all previous actions, creating an unbreakable audit trail.
Why Order Matters: The mathematics ensures sequence integrity. You cannot rearrange an agent's history, insert fake actions, or create duplicate states. This prevents state collisions in distributed systems and makes "forking" an agent's identity mathematically impossible.
The Benefit: We can mathematically prove lineage and calculate exactly how many steps apart any two states are. This enables:
Unforgeable cryptographic lineage. One-time use per state.
LockStock treats agent states like blocks in a blockchain, but optimized for high-frequency updates. Every new state Sn must contain the SHA-256 hash of the previous state Sn-1.
Replay Attack Prevention: Once a state hash is "spent" to create a new state, it cannot be used again. The chain is strictly forward-moving. Any attempt to reuse a hash is immediately rejected as a replay attack.
This is automatic credential rotation at the proof level. While your base secret remains constant (hardware-locked in the Liberty vault), the cryptographic proof you present changes with every single action. It's like having a new password for every API call—except you don't have to manage it.
Export passport → migrate to new host → import → resume at exact sequence.
True portability means the agent is independent of the hardware it runs on. LockStock serializes the entire Topological State and Hash Chain into a portable binary blob.
Zero-Loss Resume: The agent "wakes up" on the new server with memory, goals, and context perfectly intact. This enables Edge-to-Cloud and Cloud-to-Cloud mobility without custom ETL pipelines.
Use Cases:
┌─────────────────────────────────────────┐
│ Agent Passport Identity │
│ ┌────────────────────────────────────┐ │
│ │ agent_id: "bot-001" │ │
│ │ sequence: 1247 │ │
│ │ parent_hash: sha256(prev_state) │ │
│ │ signature: hmac_sha256(...) │ │
│ └────────────────────────────────────┘ │
└─────────────────────────────────────────┘
↓
┌─────────────────────────────────────────┐
│ Sequential Verifiable Memory │
│ S₁ → S₂ → S₃ → ... → S_n │
│ (Cryptographically Linked States) │
└─────────────────────────────────────────┘
↓
┌─────────────────────────────────────────┐
│ Parent Hash Chain │
│ Genesis → H₁ → H₂ → ... → H_n │
│ (Unforgeable Cryptographic Lineage) │
└─────────────────────────────────────────┘
↓
┌─────────────────────────────────────────┐
│ Agent Teleportation │
│ Export → Transfer → Import → Resume │
└─────────────────────────────────────────┘
Ready to give your agents a soul? Start with the Quickstart Guide or explore the full API Reference.
For enterprise deployments with velocity monitoring and causal auditing, check out LockStock Guard.